In computing IOC stands for indicator of compromise. These indicators can be found after a system intrusion and tell the investigators something about the sort of attack or security breach. These indicators can be IP addresses, domains, hashes of malware files, virus signatures, and similar artifacts. They can lead the investigators to the vulnerabilities that may have been used, possible prevention methods, and sometimes even help in attribution.

Select your language